Cryptography – Particular algorithmic function encoding
Reexamination Certificate
2008-07-08
2008-07-08
Zand, Kambiz (Department: 2134)
Cryptography
Particular algorithmic function encoding
C713S194000, C713S190000
Reexamination Certificate
active
10433966
ABSTRACT:
Existing encryption systems are designed to protect secret keys or other data under a “black box attack,” where the attacker may examine the algorithm, and various inputs and outputs, but has no visibility into the execution of the algotitm itself. However, it has been shown that the black box model is generally unrealistic, and that attack efficiency rises dramatically if the attacker can observe even minor aspects of the algorithm's execution. The invention protects software from a “white-box attack”, where the attacker has total visibility into software implementation and execution. In general, this is done by encoding the software and widely diffusing sites of information transfer and/or combination and/or loss. Other embodiments of the invention include: the introduction of lossy subcomponents, processing inputs and outputs with random cryptographic functions, and representing algorithmic steps or components as tables, which permits encoding to be represented with arbitrary nonlinear bijections.
REFERENCES:
patent: 5892899 (1999-04-01), Aucsmith et al.
patent: 6668325 (2003-12-01), Collberg et al.
patent: 7073072 (2006-07-01), Salle
patent: 7162031 (2007-01-01), Roelofsen et al.
patent: 2002/0016918 (2002-02-01), Tucker et al.
patent: 981223 (2000-02-01), None
Chow, S. et al. “A White-Box DES Implementation for DRM Applications”, Oct. 15, 2002.
Coron, Jean-Sebastien. “Resistance Against Differential Power Analysis for Elliptic Curve Cryptosystems”, 1999.
Coron, Jean-Sebastien et al. “On Boolean and Arithmetic Masking against Differential Power Analysis”, 2000.
Daemen, Joan et al. “Bitslice Ciphers and Power Analysis Attacks”, 2000.
Daemen, Joan et al. “Efficient Block Ciphers for Smartcards”, May 1999.
Goubin, Louis et al. “DES and Differential Power Analysis, The “Duplication” Method”, Aug. 1999.
Chow Stanley T.
Eisen Philip A.
Johnson Harold J.
Borden Ladner Gervais LLP
Cloakware Corporation
Measures Jeffrey M.
Simitoski Michael J.
Zand Kambiz
LandOfFree
System and method for protecting computer software from a... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System and method for protecting computer software from a..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for protecting computer software from a... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3947466